Data Security Requirements Sample Clauses

POPULAR SAMPLE Copied 6 times
Data Security Requirements. Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).
Data Security Requirements. The Acquired Entities and the conduct of their business are in compliance in all material respects with all Data Security Requirements. Each Acquired Entity has secured all material necessary rights, consents, and permissions, as applicable, consistent with Data Security Requirements sufficient for the processing of Personal Information by the Acquired Entities. Since the Look-Back Date, there has not been any (i) actual, suspected or alleged incidents of data security breaches or unauthorized access with respect to the Business Systems or (ii) actual, suspected or alleged unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration or use of any Personal Information, which in either case (x) would be reasonably likely to result in any material loss or material liability to the Acquired Entities; (y) resulted in a notice by the Acquired Entities to, or a requirement to notify, any Persons, or (z) resulted in a complaint from any Person. Each Acquired Entity has established or is subject to, and since the Look-Back Date has been in material compliance with, a written information security program comprising commercially reasonable administrative, technical and physical safeguards designed to: (A) protect the security, confidentiality, and integrity of all Business Systems and all Acquired Entity Data; (B) prevent unauthorized access to, use or disclosure of the Business Systems and Acquired Entity Data; (C) includes reasonable policies and procedures that apply to each Acquired Entity with respect to privacy, data protection, processing, security and the collection and use of and Acquired Entity Data; and (D) identify threats to the confidentiality or security of Acquired Entity Data and intrusions into the Business Systems. Each Acquired Entity has been subject to routine security risk assessments in accordance with industry standards and have addressed and fully remediated all material threats and deficiencies identified in any assessments of the security risks or vulnerabilities of each Acquired Entity.
Data Security Requirements. Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data. Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less string...
Data Security Requirements. Attachment E shall only apply if the Contractor serves 150 or more DSHS records across all programs or services throughout their organization, or transmits more than 5 records at one time.
Data Security Requirements. Exhibit A shall only apply to the County if the County possesses 150 or more DSHS records across all programs or services throughout their organization, or transmits more than 5 records at one time.
Data Security Requirements. USBFS must have well-documented procedures for information backup with validity checked on a periodic interval.
Data Security Requirements. A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by: 1. Transporting the data within the County network or Agency’s internal network, or; 2. Encrypting any data that will be in transit outside the County’s network or Agency’s internal network. This includes transit over the public Internet.
Data Security Requirements. Website Payment Pro, Advanced Credit and Debit Card Payments and Virtual Terminal enable you to accept payments online directly from debit and credit cards, which are payment instruments whose security depends on controlling the disclosure of Card Data. A person who has sufficient Card Data can send or receive a card payment charged to the cardholder’s account without necessarily having the cardholder’s authorisation for the payment. To prevent your Shared Customers from having their Card Data misused, you must keep Card Data secret at all times. The General Data Protection Regulation also requires you to keep a Shared Customer’s personal data secure. PayPal strongly recommends that you obtain the services of a competent professional expert in information security to advise you and assist in securing your website and any other points of sale.
Data Security Requirements. Exhibit A shall only apply to the County if the County possesses 150 or
Data Security Requirements. Protection of Data